TFN2K (1999)
Builds on TFN
Decoy packets & other measures make traffic difficult to identify & filter
Fakes source address of communications
New attacks include malformed packet floods – greater devastation in fewer packets
Available for Unix & NT Systems
Previous slide
Next slide
Back to first slide
View graphic version